Kingston Upon Thames, Surrey, United Kingdom Hybrid / WFH Options
Unilever
red team automation Detection Engineering Collaboration : Ability to translate offensive findings into detection logic and partner with SOC teams to improve alerting and response. Threat Modelling & MITREATT&CK : Strong understanding of attacker TTPs and ability to map findings to frameworks like MITREATT&CK and the Cyber Kill Chain. … red/purple teaming, adversary emulation, and vulnerability exploitation. - Proficiency with tools such as Cobalt Strike, Metasploit, Burp Suite, BloodHound, and custom scripting. - Strong understanding of MITREATT&CK, cyber kill chain, and threat-informed defense. - Experience integrating offensive security into CI/CD pipelines and cloud-native environments. - Relevant certifications (e.g., OSCP, OSCE, CRTO More ❯
positives. Output activities from refinement sessions such as development and/or refinement of rules and workbooks. Optimisation activities such as log utilisation tracking and refinement. MITREATT&CK heat map coverage. Working with internal ITC teams and the Customer to identify any onboarding or offboarding projects of appropriate log sources necessary for effective security … LLD (co-management activity). Skills required: Hands-on MXDR/SIEM experience (e.g., Sentinel, Splunk, QRadar) Strong telemetry parsing/enrichment skills Solid grasp of MITREATT&CK & threat-detection best practices Clear communicator with a customer-focused mindset Passion for continuous improvement in cyber defence Please apply within for further details. Alex Reeder More ❯
vulnerabilities. Ability to coordinate and chair regular meetings and workshops with multiple stakeholders to provide guidance, collaboration and oversight of vulnerability remediation initiatives. Excellent understanding of MITREATT&CK framework, adversary tactics and techniques. Confidence in presenting information and acting as a source of SME knowledge and guidance. Analytical, conceptual thinking, planning and execution skills. … responsibility models. Strong communication skills with the ability to explain complex security issues to non-technical stakeholders. Knowledge of Zero Trust architecture and security frameworks (e.g., MITREATT&CK). Experience in red/blue team exercises. Familiarity with cloud-native security tools and infrastructure-as-code (e.g., Azure Policy, ARM/Bicep, Terraform). More ❯
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITREATT&CK and NIST CSF Excellent communication skills with the ability to influence technical and business stakeholders across all levels of an organization Experience supporting RFP/RFI … and implementation capabilities. Provide input to product teams on feature gaps or enhancements based on customer feedback. Stay abreast of the latest threat trends, frameworks (e.g., MITREATT&CK, Zero Trust), and regulatory requirements. Set yourself apart: Industry certifications such as CISSP, SC-200, PCNSE, Fortinet NSE, CCFR, or Zscaler Certified Expert Experience designing or More ❯
of use cases, threat intelligence, and vulnerability management. Key Responsibilities Lead the DFIR function, overseeing incident detection, investigation, and response activities. Develop and implement IR methodologies (MITREATT&CK, Kill Chain, Threat Modelling, Diamond Model). Conduct forensic investigations on systems, networks, and endpoints. Refine threat hunting and threat intelligence capabilities. Support and mature security … cyber incident response teams. Deep technical knowledge of IR and forensic analysis (eg Wireshark, packet capture, host-based artifacts). Strong understanding of security monitoring frameworks (MITREATT&CK, NIST, etc.). Experience working in financial services or a regulated environment preferred. Hands-on experience with SIEM tools, network forensics, and endpoint detection. Knowledge of More ❯
with wider teams. Strong analytical mindset, self-motivated learner, and passionate about cloud security trends and technologies. Good understanding of security frameworks and methodologies such as MITREATT&CK, NIST, ISO/IEC 27001, CIS Benchmarks. Desired 5+ years of experience in a similar role such as Cloud Security Consultant, Cloud Security Engineer, or Cloud More ❯
UK. Desirable: Experience in a Managed Services or Managed Security Services Provider (MSP/MSSP). Certifications such as CompTIA Security+, CySA+, or equivalent. Familiarity with MITREATT&CK, threat hunting, or scripting (e.g., PowerShell, Python). What’s in It for You £40,000 – £55,000 base salary (depending on experience) Hybrid working model More ❯
City of London, London, United Kingdom Hybrid / WFH Options
HD TECH Recruitment
UK. Desirable: Experience in a Managed Services or Managed Security Services Provider (MSP/MSSP). Certifications such as CompTIA Security+, CySA+, or equivalent. Familiarity with MITREATT&CK, threat hunting, or scripting (e.g., PowerShell, Python). What’s in It for You £40,000 – £55,000 base salary (depending on experience) Hybrid working model More ❯
Incident Response. Experience in performing analysis with SIEM technologies such as Splunk and/or Google Chronicle. Experience in performing proactive and reactive threat hunting using MITREATT&CK or similar frameworks. In-depth understanding and working knowledge of security appliances/tools such as host-based and network-based IDS/IPS, WAF, EDR More ❯
Incident Response. Experience in performing analysis with SIEM technologies such as Splunk and/or Google Chronicle. Experience in performing proactive and reactive threat hunting using MITREATT&CK or similar frameworks. In-depth understanding and working knowledge of security appliances/tools such as host-based and network-based IDS/IPS, WAF, EDR More ❯
across diverse environments (cloud, hybrid, manufacturing). - Hands-on expertise with EDR, SOAR tooling, and SASE/SSE technologies. - Deep familiarity with frameworks such as NIST, MITREATT&CK, and other industry standards. - Strong stakeholder management skills and the ability to influence at all levels of the business. - A pragmatic, action-oriented approach to reaching More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Precise Placements
preferred), and SOAR tools. Expertise in incident handling , threat analysis , and digital forensics . Scripting or automation experience (Python, PowerShell, etc.) is highly beneficial. Knowledge of MITREATT&CK , NIST CSF , and related security frameworks. Legal, financial, or similarly high-compliance industry experience is a bonus. Why Apply? Join a global firm with one of More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Client Server
experience in Security Operations and Incident Response You have experience of performing analysis with SIEM technologies, Splunk preferred You have experience with proactive threat hunting using MITREATT&CK or similar frameworks You have a deep understanding of security appliances/tools such as host-based and network-based IDS/IPS, WAF, EDR You More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
experience in Security Operations and Incident Response You have experience of performing analysis with SIEM technologies, Splunk preferred You have experience with proactive threat hunting using MITREATT&CK or similar frameworks You have a deep understanding of security appliances/tools such as host-based and network-based IDS/IPS, WAF, EDR You More ❯
must have demonstrable expertise with monitoring and securing enterprise class technology estates. You will have proven experience with Cyber Security best practice including remediations for the MITREATT&CK Framework and NIST Cloud Security guidelines. You will support ISO 27001 compliance and have strong documentation skills. Experience in the Telco sector and knowledge of the More ❯
technical experience in computer forensics for cyber incident response and investigations. Understanding of best practices (NPCC, NIST, ISO17025) in evidence handling, systems, and tools. Knowledge of MITREATT&CK, Cyber Kill Chain, network topology, and EDR solutions. Expertise in multiple operating systems (Microsoft, Linux), cloud services (Microsoft 365, Azure, AWS, Google Workspace), and on-premise More ❯
compliance frameworks ISO 27001, NIST, DORA, CREST. TIBER etc.) Willingness to travel to regular F2F end user meetings Familiarity with tools and standards such as OWASP, MITREATT&CK etc Self-starter with a results-oriented mindset and the ability to work independently Experience using CRM and sales analytics platforms Ability to thrive in a More ❯
cyber-attacks. Experience within a Security Operations Centre. Fluent in English, both written and spoken. Excellent presentation and analytical skills. Preferred Skills and Qualifications Understanding of MITREATT&CK techniques and ability to explain TTPs to clients. Experience creating SIGMA, SNORT, and YARA rules for detection. Control Risks offers a competitive compensation and benefits package More ❯
better suited to. 8+ years of experience in IoT security, preferably in the medical device or the pharmaceutical industry. Proficiency in security frameworks (e.g., NIST, OWASP, MITREATT&CK, PASTA, STRIDE) and standards such as FDA cybersecurity guidance Experience assessing security risks using industry standard methods (penetration test results, threat modeling, security testing) and determining More ❯
strategies (e.g., Zscaler, Cisco Umbrella, Infoblox) and their role in threat containment Deep knowledge of Zero Trust Architecture, lateral movement prevention, and alignment to frameworks like MITREATT&CK and NIST CSF Excellent communication skills with the ability to influence technical and business stakeholders across all levels of an organization Experience supporting RFP/RFI More ❯
Experience leading and coaching junior security engineers to improve their skills and effectiveness. PREFERRED QUALIFICATIONS BS or MS in a STEM related field. Understanding of the MitreATT&CK framework and knowledge of host and network telemetry data (e.g., process lists, application logs, NetFlow). Have awareness and understanding of current cyber security threats, actors More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
QBE Management Services (UK) Limited
response. About you Strong experience across both offensive and defensive cyber security disciplines. Deep understanding of attacker tactics, techniques, and procedures (TTPs), with expertise in the MITREATT&CK Framework. Hands-on technical knowledge in cyber detection engineering, security tools, and infrastructure. Skilled in Detection-as-Code and experienced with SIEM query languages. Confident communicator More ❯
risk assessments and threat modelings ; Strong ability to communicate technical concepts and assessment results verbally and in written reports in simple terms; Knowledge of IEC 62443, MITREATT&CK for ICS, NIST CSF, NIST SP 800-82 and relevant regulations in EU and UK; Interest and ability to write exciting whitepapers and publications ; A supportive More ❯
in security testing A proven track record of managing and growing high-performing teams You possess practiced competence with red teaming methodologies and experience using the MITREATT&CK framework for adversary simulations You're skilled in Objective-C, Go, Bash, Python, or JXA, and have knowledge of macOS C2 frameworks and hacking techniques You More ❯